SlideShare a Scribd company logo
1 of 16
3D
-PASSWORD
ITCS (BS.CS)2015
(JINNAH UNIVERSITY
FOR WOMEN)
Members of the presentation:
1.MUNIBA BUKHARI
2.IQRA AJAZ
Introduction:
 Authentication is one of the most important security
service provided to system by the different
authentication schemes or algorithms.
 To protect any system authentication must be provided,
so that only authorized persons can have right to use or
handle that system & data related to that system
securely.
 There are many authentication algorithms are available
some are effective & secure but having some drawback.
 Previously there are many authentication techniques
were introduced such as Graphical password, Text
password, Biometric authentication, etc.
Authentication:
Authentication is a process of validating who
are you to whom you claimed to be.
Common Authentication
Techniques:
 Textual Passwords
(Recall Based)
Recall what you
have created
before.
 Biometric
schemes
(fingerprints,
voice recognition
etc)
 Graphical
Passwords:
(Recall Based+
Recognition
Based)
Drawbacks of existing
system
Current authentication suffer from many weakness.
 Textual are commonly used, users tends to use
meaningful words from dictionaries, which
makes textual passwords easy to break.
 Smart cards can be stolen.
 We rarely use Biometric scheme because it has some draw
backs
Like(HW COST IS MORE)
What is 3D PASSWORD?
It is the collected user actions and
interactions in the 3D virtual
environment construct the 3D password
3D PASSWORD SCHEME
The 3D Password scheme is a new authentication scheme that
combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
(In one authentication system)
Objectives of 3D
PASSWORD
 To provide more secure authentication
technique than existing one.
 To design and develop user friendly and
easier authentication scheme as single
system.
 To overcome the drawbacks and
limitations of previously existing system
(textual password, graphical password
etc.)
 New scheme should be combination of
recall-recongnition ,biometrics and token
based authentication schemes.
3D Password Selection
Virtual objects can be any objects we encounter in real life:
 A computer on which the user can type
 A fingerprint reader that requires users fingerprint
 A paper or white board on which users fingerprint
 A Automated teller (ATM) machine that requires a
token
 A light that can be switched on/off
 A television
 A car that can be driven
 A graphical password scheme
3D Passwords
Differentiators
• FLEXIBILITY:
3D password allows multifactor's authentically
biometric, textual password can be embedded in 3D
password technology.
• STRENGTH:
This scenario provides almost unlimited password
possibility.
• RESPECT OF PRIVACY:
Organizers can select authentication schemes that
respect users privacy.
Advantages of 3D -
PASSWORD
It provides security.
It can’t be taken by another person.
3D graphical password has no limits.
Password can be change easily whenever we
want.
It helps to keep lots of personal details.
Areas
Critical Servers.
Nuclear and military facilities.
Airplanes and Jetfighters.
ATM’S, Desktops and laptops logins, Web
authentication.
Attacks and
Countermeasures
 Brute Force Attack: The attack is very difficult
because
i. Time required to login may vary form 20s to 2 min
therefore it is very time consuming.
ii. Cost of Attack: A 3D virtual environment may
contain biometric information.
 Well studied Attack: Attackers tries to get the most
probable distribution of 3D password.
(This is difficult because attacker has to perform
customized attack to different virtual environment)
Attacks and
Countermeasures Cont..
Shoulder surfing attacks:
Attackers uses camera to record the users
3D PASSEORDS , it is more successful.
Timing attack:
The attackers observes how long it takes the
legitimates user to perform correct log in using 3D
PASSWORDS length.(This attack can’t be
successful since it gives the attacker the multiple
hints)
Conclusion
• The authentication is approved by 3D
PASSWORD ,because the un-authorized
person may not interact with same object at a
particular location.
• It is much difficult to crack , because it has no
fixed no of steps and a particular procedure.
• The 3D-PASSWORD is unbreakable.
THANK
YOU 

More Related Content

What's hot (20)

3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3d password
3d password3d password
3d password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3 d password
3 d password3 d password
3 d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password3D password
3D password
 

Viewers also liked

Learning fingerprint reconstruction from minutiae to image
Learning fingerprint reconstruction from minutiae to imageLearning fingerprint reconstruction from minutiae to image
Learning fingerprint reconstruction from minutiae to imageI3E Technologies
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsVala Afshar
 

Viewers also liked (9)

Learning fingerprint reconstruction from minutiae to image
Learning fingerprint reconstruction from minutiae to imageLearning fingerprint reconstruction from minutiae to image
Learning fingerprint reconstruction from minutiae to image
 
3D Password
3D Password3D Password
3D Password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to 3D password (20)

3D-Password
3D-Password 3D-Password
3D-Password
 
3 d
3 d3 d
3 d
 
3d password
3d password3d password
3d password
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3 d password
3 d password3 d password
3 d password
 
3 d password
3 d password 3 d password
3 d password
 
3 d password
3 d password3 d password
3 d password
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
3d authentication
3d authentication3d authentication
3d authentication
 
3d password
3d  password3d  password
3d password
 
3d
3d3d
3d
 
3dpassword
3dpassword3dpassword
3dpassword
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
3d pass words
3d pass words3d pass words
3d pass words
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 

More from Muniba Bukhari

More from Muniba Bukhari (6)

Mayan cicilaization
Mayan cicilaizationMayan cicilaization
Mayan cicilaization
 
Ramadan
Ramadan Ramadan
Ramadan
 
persuasive writing
persuasive writing persuasive writing
persuasive writing
 
Oral presentation
Oral presentationOral presentation
Oral presentation
 
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEB
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEBFUNDAMENTALS OF INTERNET AND WORLD WIDE WEB
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEB
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

3D password

  • 1. 3D -PASSWORD ITCS (BS.CS)2015 (JINNAH UNIVERSITY FOR WOMEN) Members of the presentation: 1.MUNIBA BUKHARI 2.IQRA AJAZ
  • 2. Introduction:  Authentication is one of the most important security service provided to system by the different authentication schemes or algorithms.  To protect any system authentication must be provided, so that only authorized persons can have right to use or handle that system & data related to that system securely.  There are many authentication algorithms are available some are effective & secure but having some drawback.  Previously there are many authentication techniques were introduced such as Graphical password, Text password, Biometric authentication, etc.
  • 3. Authentication: Authentication is a process of validating who are you to whom you claimed to be.
  • 4. Common Authentication Techniques:  Textual Passwords (Recall Based) Recall what you have created before.  Biometric schemes (fingerprints, voice recognition etc)  Graphical Passwords: (Recall Based+ Recognition Based)
  • 5. Drawbacks of existing system Current authentication suffer from many weakness.  Textual are commonly used, users tends to use meaningful words from dictionaries, which makes textual passwords easy to break.  Smart cards can be stolen.  We rarely use Biometric scheme because it has some draw backs Like(HW COST IS MORE)
  • 6. What is 3D PASSWORD? It is the collected user actions and interactions in the 3D virtual environment construct the 3D password
  • 7. 3D PASSWORD SCHEME The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC (In one authentication system)
  • 8. Objectives of 3D PASSWORD  To provide more secure authentication technique than existing one.  To design and develop user friendly and easier authentication scheme as single system.  To overcome the drawbacks and limitations of previously existing system (textual password, graphical password etc.)  New scheme should be combination of recall-recongnition ,biometrics and token based authentication schemes.
  • 9. 3D Password Selection Virtual objects can be any objects we encounter in real life:  A computer on which the user can type  A fingerprint reader that requires users fingerprint  A paper or white board on which users fingerprint  A Automated teller (ATM) machine that requires a token  A light that can be switched on/off  A television  A car that can be driven  A graphical password scheme
  • 10. 3D Passwords Differentiators • FLEXIBILITY: 3D password allows multifactor's authentically biometric, textual password can be embedded in 3D password technology. • STRENGTH: This scenario provides almost unlimited password possibility. • RESPECT OF PRIVACY: Organizers can select authentication schemes that respect users privacy.
  • 11. Advantages of 3D - PASSWORD It provides security. It can’t be taken by another person. 3D graphical password has no limits. Password can be change easily whenever we want. It helps to keep lots of personal details.
  • 12. Areas Critical Servers. Nuclear and military facilities. Airplanes and Jetfighters. ATM’S, Desktops and laptops logins, Web authentication.
  • 13. Attacks and Countermeasures  Brute Force Attack: The attack is very difficult because i. Time required to login may vary form 20s to 2 min therefore it is very time consuming. ii. Cost of Attack: A 3D virtual environment may contain biometric information.  Well studied Attack: Attackers tries to get the most probable distribution of 3D password. (This is difficult because attacker has to perform customized attack to different virtual environment)
  • 14. Attacks and Countermeasures Cont.. Shoulder surfing attacks: Attackers uses camera to record the users 3D PASSEORDS , it is more successful. Timing attack: The attackers observes how long it takes the legitimates user to perform correct log in using 3D PASSWORDS length.(This attack can’t be successful since it gives the attacker the multiple hints)
  • 15. Conclusion • The authentication is approved by 3D PASSWORD ,because the un-authorized person may not interact with same object at a particular location. • It is much difficult to crack , because it has no fixed no of steps and a particular procedure. • The 3D-PASSWORD is unbreakable.